|
||||||
|
||
|
Home > For her software |
|
|
21. | EF Duplicate Files Manager 3.21 (efsoftware.com) | ||
work in several ways. In the simplest case you let the program look for all files of same name. Or you give that only such files are to be specified in the result list, which exhibit additionally the same file size. If necessary, the EF Duplicate Files Manager can analyze even the file content. It | |||
Updated: 2, 2006 | Rating: 0 | Author: Emil Fickel | Size: 1854 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
22. | ActiveScreenLock 2.81 (dmvsoft.com) | ||
Most of us prefer not to turn computer off while we are away for coffee or going to the lavatory or have to attend a meeting in a conference room next door. That is the point where an average computer system is most vulnerable to felon's attack. The guy just has to have a glance at your monitor and he has it all! Introducing Active Screen Lock, the unique security | |||
Updated: 2, 2006 | Rating: 173 | Author: DMVsoft | Size: 1335 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
23. | Access Administrator 4.14 (softheap.com) | ||
protection activates automatically according to the current user's idenity and the timetable that is defined for it. You can disable Internet access, games and the other entertainment during the working time. For example, from 9:00 AM till 17:00 PM the user "User" can use Microsoft Office only, but after 17:00 PM he can also play his games and see pictures while | |||
Updated: 2, 2006 | Rating: 113 | Author: Ixis Ltd | Size: 678 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
24. | Internet Secure Tunneling 2.0.0.228 (han-soft.biz) | ||
traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company employees to access their email, company intraweb pages and shared files securely by even when working from home or on the road | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 927 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
25. | Send Personally 1.9.0 (mailutilities.com) | ||
of sending messages from Outlook, separate message being created for each recipient. The final recipient will get no information about the other recipients. Moreover, he/she will see only his/her name and address in the "To" field, as if the message was sent only to him/her. The main problem with sending messages through Outlook is that Outlook shows all the | |||
Updated: 2, 2006 | Rating: 0 | Author: Andrey Manchuk | Size: 2005 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
26. | Send Personally 1.9.0 (mapilab.com) | ||
of sending messages from Outlook, separate message being created for each recipient. The final recipient will get no information about the other recipients. Moreover, he/she will see only his/her name and address in the "To" field, as if the message was sent only to him/her. The main problem with sending messages through Outlook is that Outlook shows all the | |||
Updated: 2, 2006 | Rating: 42 | Author: Andrey Manchuk | Size: 2005 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
27. | Mirador Instant Messenger 4.0.2.6 (e-securion.com) | ||
reliable and feature-rich presence based messaging solution built for the enterprise. It offers advanced functionality, security and stability that businesses require and helps to ensure compliance with various regulatory agencies such as HIPPA and the SEC. At the core of MIM is a powerful client-server architecture designed with the latest technology. Mirador Instant Messenger | |||
Updated: 2, 2006 | Rating: 0 | Author: Jack Boulay | Size: 38928 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
28. | Internet Secure Tunneling 2.0.0.228 (han-soft.com) | ||
traffic through encrypted SSH Secure Shell tunnel. You can secure for example DATABASE, POP3, SMTP and HTTP connections that would otherwise be insecure. The tunneling capability of SSH Secure Shell is a feature that allows, for example, company employees to access their email, company intraweb pages and shared files securely by even when working from home or on the road | |||
Updated: 2, 2006 | Rating: 0 | Author: JING YU HAN | Size: 927 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
29. | Easy Blogs 2006 (uuba.com) | ||
Just pick one and click on generate. If you are in the mood for something completely different, just pick a new template, click, and the entire site changes. (6) Automatic publishing to your web site using either FTP or to a local directory on your computer. (7) Your journal information is kept on your local computer, so you can move your site to another web site host just by | |||
Updated: 2, 2006 | Rating: 0 | Author: -- EasyBlogs.com | Size: 1200 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
30. | Wall Street Raider 3.10 (roninsoft.com) | ||
competitors, and many other fair or unfair tactics. All in the quest for the Almighty Dollar (or Yen, Pound, Euro, or other currency you configure it for). All your investment research and financial wheeling and dealing occur against the backdrop of a nonstop 'live' stock ticker tape, scrolling | |||
Updated: 2, 2006 | Rating: 310 | Author: Michael Jenkins | Size: 1613 kb | Shareware Go to category: Games & Entertainment > Simulation Similar programs | |||
|
Home > For her software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|